The eSentire Blog

TRU Positive/Bulletin

3 M

Resurgence in Qakbot Malware Activity

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

4 M

Socgholish to Cobalt Strike in 10 Minutes

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

9 M

eSentire Threat Intelligence Malware Analysis: PINGPULL RAT

PINGPULL is a Remote Access Tool (RAT) that is used as a new backdoor variant that allows threat actors to encrypt…

READ NOW →

TRU Positive/Bulletin

4 M

Emotet Malware Detected Through a Phishing Campaign

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

12 M

eSentire Threat Intelligence Malware Analysis: Purple Fox

Purple Fox malware was first discovered in 2018 and was delivered by RIG EK (Exploit Kit). However, it has now…

READ NOW →

TRU Positive/Bulletin

4 M

Gootkit Loader Returns to Deliver Cobalt Strike

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Response Unit

4 M

The Popular Malware Downloader, GootLoader, Expands its Payloads Yet Again, Infecting a...

In an unreported first - GootLoader, a popular malware-as-a-service (MaaS) offering which leverages Search Engine…

READ NOW →

TRU Positive/Bulletin

14 M

eSentire Threat Intelligence Malware Analysis: Mars Stealer

Mars Stealer is an information-stealing malware that first appeared on hacking forums in June 2021, a year after…

READ NOW →

TRU Positive/Bulletin

3 M

Attackers Use Third-Party Contractor Account to Infiltrate Network

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

TRU Positive/Bulletin

2 M

Redline Stealer Masquerades as Photo Editing Software

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →

Threat Intelligence

5 M

Will Counterattacks Stop Cybercriminals?

Cybersecurity is not an IT problem to solve—it's a business risk to manage. In the Managing Cyber Risk podcast…

READ NOW →

TRU Positive/Bulletin

3 M

AsyncRAT Activity

Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and…

READ NOW →
Page
of 22